Insight

CISO Radar: what to expect in 2025?

Published January 15, 2025

  • Cybersecurity

After several years of intense investment and the implementation of ambitious cyber security enhancement programs, 2025 will mark the end of a strategic cycle for many organizations. The increasingly challenging economic conditions and the desire of many management committees to rationalize spending will increase pressure on cyber budgets, with stakes remaining high.

IT systems are becoming ever more complex, perimeters less controllable, particularly with the rise of artificial intelligence, regulations are multiplying and specializing, and geopolitical tensions are increasing the overall level of cyber risk. The CISO will therefore face a major challenge: maintain, or even strengthen, security while optimizing available resources.

To prepare for this pivotal year, join us in deciphering the major trends that will transform the cybersecurity landscape in 2025 and beyond.

CISO Radar 2025

For over 10 years, Wavestone has annually updated its forecasting tool: the “CISO Radar,” which encompasses all the essential topics for cybersecurity and operational resilience sectors. Its creation is based on a collaborative effort involving all the managers and experts from our teams. This radar reflects the engagements carried out throughout the year as well as the developments observed in the field.

Based on this radar and our analyses, we have identified the three major areas that will likely shape the coming years, along with emerging topics to start keeping an eye on this year.

The need to rationalize and optimize operations

In recent years, due to the increase in cyberattacks, organizations have heavily invested in expanding and improving their cybersecurity services. Today, we are facing a slowdown of this trend, with CISOs encountering significant budgetary pressures that require rethinking their organization. However, this has not been accompanied by a reduction in threats—quite the opposite! Therefore, they must keep improving their security posture, albeit with the same resources.

1. Streamline existing processes and tools

The growth in recent years has improved the level of cybersecurity, especially in large organizations. However, the multiplication of processes and tools creates redundancies and conflicts, limiting efficiency and complicating cost control, an issue increasingly monitored by executive committees. Therefore, rationalization becomes essential.

For processes, standardizing practices between geographies or teams prevents misunderstandings, duplications, and inconsistent analyses. This approach is crucial to meet the growing needs of businesses while maintaining responsiveness. Sectors such as finance are particularly affected, especially regarding topics such as reference frameworks and control functions, which have multiplied, incident response procedures, or the integration of security into projects.

2. Improve the management of your teams

Last year, we explored the talent shortage in the cybersecurity sector and the strategies to mitigate it. Given the current economic constraints and the increasing geographical dispersion of organizations, optimizing the placement of human resources has become essential. This approach, known as “smart sourcing,” involves identifying the right locations to find talent, balancing the need for expertise with cost efficiency:

  • In your geography, to benefit from local expertise, even on-site, with high flexibility and adaptability.
  • Nearshore, to optimize efforts while benefiting from geographical and linguistic proximity, and growing expertise, particularly in Portugal or Eastern Europe for European-based organizations, Mexico or South America for North America, or Southeast Asia for Pacific Asia.
  • Offshore, to reduce costs on already mature processes, while remaining attentive to final efficiency. The most common destination countries remain India and Southeast Asia.

In parallel, in an always very tight cybersecurity job market, it is essential to keep internal teams aligned with your organization’s long-term vision. To achieve this, a “Talent Management” approach must be implemented to properly manage a truly key sector within the organization. Without going over all the best practices, some major points must be considered:

  • Create a team spirit with common practices and rituals, especially to share expertise and skills.
  • Promote team development by offering training opportunities and clear, long-term career plans.
  • Value your experts and stay attentive to their aspirations.

 

To find the right balance, analyze your existing processes, their maturity, their importance for the security of your assets, and the desired geographical coverage. “Smart sourcing” can be very beneficial by freeing up time for hands-on or management tasks. However, you can only effectively outsource what you master, and massive offshoring can lead to negative effects on several levels. Once again, this becomes a risk management task for the CISO, but this time from an HR perspective!

 

3. Be able to demonstrate the value of cybersecurity

In a context of limited resources, it becomes essential to prove the value of cybersecurity. Two actions can be taken:

It allows for a concrete evaluation of the impact of security measures on financial, operational, and strategic levels. Thanks to emerging solutions, this exercise is more accessible and facilitates communication with executive committees, allowing for the prioritization of actions. This approach works in all sectors.

While ensuring the scaling of key cyber challenges!

Traditionally, organizations have prioritized strengthening the security of the core of their IT systems, and according to field feedback, they have generally succeeded. But cyber attackers have adapted their tactics: they now target small entities and subsidiaries, privileged accounts, or cloud vulnerabilities to access less defended areas. Regulators, for their part, require increased attention to suppliers and the securing of expanded perimeters.

 

All this, in a tense geopolitical context where standardizing practices is no longer always possible with the increase in compartmentalization, to anticipate or meet decoupling needs for regulatory or geopolitical reasons. We had already noted this trend in our previous radar edition, and it remains relevant today.

 

Scaling up is essential but remains complex and seems to approach the impossible! Informed, reasoned choices must be made, in line with the IT department’s and organization’s strategy, and debated at the right level. Of course, three important activities must continue in 2025:

  • Maximizing the potential of the Cloud. While it offers benefits for IT as well as cybersecurity, as we discussed last year, this new infrastructure—and particularly its administration—must be secured. Leverage Microsoft’s Enterprise Access Model to adapt the concept of tiering to your cloud environments and integrate massive cloud unavailability scenarios into your crisis exercises and resilience plans.
  • Developing CI/CD pipelines: beneficial due to the automation and standardization of practices for better integrating security into projects. It is becoming a systemic component of the IT system and can, if poorly protected, lead to its complete compromise! Ensure this transformation does not backfire by treating it as almost as critical as a “new Active Directory.”
  • And, of course, Zero Trust, a crucial initiative we identified last year. Governance will be key for this deep transformation: designate a leader and ensure that all relevant stakeholders are gathered at the table (network, infrastructure, developers and architects, and business teams).

For 2025, we have also identified five key areas to ensure control over this ever evolving and complex scope, as well as the infrastructures supporting it.

Last year, we emphasized the importance of third-party management, a long-term effort. This observation remains more relevant than ever, but your subsidiaries and small entities also represent a risk, especially when they join your organization through a merger or acquisition. Boundaries are blurring: entities are less monolithic and maintain multiple, sometimes vastly different, connections, where visibility on security posture and action capability is limited.

Ensure security governance is adapted to these new configurations:

  • On the organizational level, ensure that your requirements and frameworks effectively cover all entities and third parties. The ability to control the application of your policies will be crucial: simplified analysis tools can help you (e.g., to evaluate your suppliers’ responses). Also, make sure that all relevant teams (legal, procurement, business, local security) are included. Some large organizations have hundreds of more or less autonomous subsidiaries and thousands, or even tens of thousands, of suppliers.
  • In terms of responsibilities, the role of the “CISO,” a catch-all for years, is still set to expand: operational resilience, fraud, IT risk management, product security… Due to the growing importance of identity, the role of “Chief Identity Officer” (CIdO) is emerging to manage and protect both internal and external IAM, and even that of objects or non-human identities. In the industry, “OT Security Officers” focus on industrial systems, and “Product Security Officers” on the security of digital products. In this context of rationalization and specialization, adopting clear governance will be necessary to communicate the allocation of responsibilities to all concerned parties and to mobilize the entire organization. Never forget that the stronger the delegation, the more the culture will have changed, and the more deeply secured the organization will be!

Make the most of the compliance boom with “regulatory management”

Different regions of the world are experiencing a wave of regulations affecting many subjects and sectors. In the United States, there is the CMMC 2.0 directive or FED/FEB; in Europe, the Cyber Resilience Act, NIS2, AI Act, DORA, REC… Other sectoral frameworks (Part-IS in aviation, UNR 155 for connected vehicles, and so on…) add to this long list. Historically focused on the protection of personal data or critical infrastructures, these regulations have expanded to more themes, sectors, and organizations. Now, almost no sector or company size is spared, and the influence of regulators continues to grow.

Even if these regulatory constraints may seem distant from business priorities, properly addressing them can be beneficial: clarifying processes, launching major projects, and highlighting your efforts to management.

Cyber regulation management will therefore be a key issue in 2025:

  • If not already done, establish an organization to identify and monitor the regulations that apply (or will apply) to you. Integrate them into your cyber roadmaps. Linked to the CISO and in close collaboration with legal or compliance teams, this entity should have a regulatory dashboard, including a mapping of texts and their application scopes (for NIS2 alone, the analysis must be carried out in the European subsidiaries of the 27 countries). Also, define Group rules to avoid inconsistent and costly implementations. Some clients even unify their security policy at the Group level to respond to most texts with a single framework.
  • For the most mature organizations with adequate resources, move to “regulatory management.” Take inspiration from the US financial sector: its most advanced players have set up active monitoring and dedicated teams that regularly interact with regulators, contribute to guidelines, and stay informed of new requirements in advance. They also organize regulator visits and the preparation and follow-up of audits, a crucial step in some sectors (such as finance), where audits can be long and demanding and disrupt regular activities.

What are the future challenges?

Beyond the underlying trends, a number of issues will begin to take center stage in 2025, requiring each cybersecurity sector to position itself on their relevance in their context.

To bypass the massive protections deployed on infrastructures, cyber attackers are increasingly targeting Identity and Access Management (IAM) systems. These systems can present the same vulnerabilities as other security components (token theft through man-in-the-middle attacks, application flaws…), making authentication bypassable or exploitable. To protect yourself:

  • Conduct a security audit specifically focused on IAM to check your platforms and account assignment processes (disabling strong authentication, resetting passwords, lost phones…).
  • Review the security of administrative accounts, including those dedicated to IAM, to prevent a compromise from allowing privilege escalation (e.g., a support account that can reset the password and MFA of a domain administrator).
  • Secure the connection between the IAM system and your applications to ensure that only authorized individuals access the required resources and be vigilant against application masking that facilitates lateral movements.

Even the most advanced players have already suffered this type of attack: make it a key element of your 2025 control plan!

Methodology of the CISO Radar

The CISO Radar presents a selection of key topics for cybersecurity and resilience professionals, which they are required to handle in their activities. 

It is organized into quadrants that outline core themes: Identity & Trust Services; Protect, Detect & Respond; Risk & Governance; Compliance & Privacy; and Operational Resilience. 

Each of these themes is divided into three maturity levels: “Mature,” “Current,” and “Emerging”. 

  • Themes at the “Mature” level can and should be mastered by any CISO.
  • Topics categorized as “Trending” are beginning to be addressed operationally; initial feedback can be shared.
  • In the “Emerging” level, you will find topics that are still relatively unknown, evolving, or for which there are no obvious solutions. Identifying them allows you to anticipate future developments and prepare for their integration into your organization.

The identification of themes, their positioning, and their analyses result from a joint effort conducted by the Cybersecurity Practice management teams at Wavestone across all the firm’s geographies.

  • Gérôme Billois

    Partner – France, Paris

    Wavestone

    LinkedIn
  • Martin D’Acremont

    Consultant – France, Paris

    Wavestone

    LinkedIn
  • Chirine Ben Abdelkader

    Consultant – France, Paris

    Wavestone